Hay
Date
July 1, 2025, 12:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.628718] ==================================================================
[   17.628801] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   17.628931] Read of size 1 at addr fff00000c7800773 by task kunit_try_catch/194
[   17.628985] 
[   17.629019] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.629212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.630471] Hardware name: linux,dummy-virt (DT)
[   17.630521] Call trace:
[   17.630545]  show_stack+0x20/0x38 (C)
[   17.630601]  dump_stack_lvl+0x8c/0xd0
[   17.630657]  print_report+0x118/0x608
[   17.630879]  kasan_report+0xdc/0x128
[   17.630954]  __asan_report_load1_noabort+0x20/0x30
[   17.631055]  ksize_unpoisons_memory+0x628/0x740
[   17.631105]  kunit_try_run_case+0x170/0x3f0
[   17.631155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.631209]  kthread+0x328/0x630
[   17.631251]  ret_from_fork+0x10/0x20
[   17.631424] 
[   17.631619] Allocated by task 194:
[   17.631653]  kasan_save_stack+0x3c/0x68
[   17.631931]  kasan_save_track+0x20/0x40
[   17.632149]  kasan_save_alloc_info+0x40/0x58
[   17.632206]  __kasan_kmalloc+0xd4/0xd8
[   17.632246]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.632287]  ksize_unpoisons_memory+0xc0/0x740
[   17.632326]  kunit_try_run_case+0x170/0x3f0
[   17.632366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.632411]  kthread+0x328/0x630
[   17.632530]  ret_from_fork+0x10/0x20
[   17.632882] 
[   17.632955] The buggy address belongs to the object at fff00000c7800700
[   17.632955]  which belongs to the cache kmalloc-128 of size 128
[   17.633048] The buggy address is located 0 bytes to the right of
[   17.633048]  allocated 115-byte region [fff00000c7800700, fff00000c7800773)
[   17.633568] 
[   17.633638] The buggy address belongs to the physical page:
[   17.633674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800
[   17.633875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.633993] page_type: f5(slab)
[   17.634032] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.634084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.634125] page dumped because: kasan: bad access detected
[   17.634155] 
[   17.634335] Memory state around the buggy address:
[   17.634377]  fff00000c7800600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.634429]  fff00000c7800680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.634481] >fff00000c7800700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.634524]                                                              ^
[   17.634708]  fff00000c7800780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.634872]  fff00000c7800800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.635041] ==================================================================
[   17.642632] ==================================================================
[   17.642684] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   17.642921] Read of size 1 at addr fff00000c780077f by task kunit_try_catch/194
[   17.643141] 
[   17.643198] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.643367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.643489] Hardware name: linux,dummy-virt (DT)
[   17.643580] Call trace:
[   17.643610]  show_stack+0x20/0x38 (C)
[   17.643684]  dump_stack_lvl+0x8c/0xd0
[   17.643733]  print_report+0x118/0x608
[   17.643778]  kasan_report+0xdc/0x128
[   17.643993]  __asan_report_load1_noabort+0x20/0x30
[   17.644056]  ksize_unpoisons_memory+0x690/0x740
[   17.644297]  kunit_try_run_case+0x170/0x3f0
[   17.644649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.645257]  kthread+0x328/0x630
[   17.645459]  ret_from_fork+0x10/0x20
[   17.645748] 
[   17.645863] Allocated by task 194:
[   17.645892]  kasan_save_stack+0x3c/0x68
[   17.645964]  kasan_save_track+0x20/0x40
[   17.646277]  kasan_save_alloc_info+0x40/0x58
[   17.646867]  __kasan_kmalloc+0xd4/0xd8
[   17.647015]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.647097]  ksize_unpoisons_memory+0xc0/0x740
[   17.647243]  kunit_try_run_case+0x170/0x3f0
[   17.647386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.647520]  kthread+0x328/0x630
[   17.647583]  ret_from_fork+0x10/0x20
[   17.647617] 
[   17.647638] The buggy address belongs to the object at fff00000c7800700
[   17.647638]  which belongs to the cache kmalloc-128 of size 128
[   17.647697] The buggy address is located 12 bytes to the right of
[   17.647697]  allocated 115-byte region [fff00000c7800700, fff00000c7800773)
[   17.648051] 
[   17.648179] The buggy address belongs to the physical page:
[   17.648255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800
[   17.648416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.648764] page_type: f5(slab)
[   17.648890] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.648978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.649019] page dumped because: kasan: bad access detected
[   17.649365] 
[   17.649471] Memory state around the buggy address:
[   17.649682]  fff00000c7800600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.649801]  fff00000c7800680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.650015] >fff00000c7800700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.650128]                                                                 ^
[   17.650234]  fff00000c7800780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.650279]  fff00000c7800800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.650536] ==================================================================
[   17.637705] ==================================================================
[   17.637784] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   17.637839] Read of size 1 at addr fff00000c7800778 by task kunit_try_catch/194
[   17.637889] 
[   17.637923] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.638007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.638035] Hardware name: linux,dummy-virt (DT)
[   17.638067] Call trace:
[   17.638097]  show_stack+0x20/0x38 (C)
[   17.638146]  dump_stack_lvl+0x8c/0xd0
[   17.638194]  print_report+0x118/0x608
[   17.638242]  kasan_report+0xdc/0x128
[   17.638288]  __asan_report_load1_noabort+0x20/0x30
[   17.638340]  ksize_unpoisons_memory+0x618/0x740
[   17.638389]  kunit_try_run_case+0x170/0x3f0
[   17.638442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.638509]  kthread+0x328/0x630
[   17.638550]  ret_from_fork+0x10/0x20
[   17.638596] 
[   17.638615] Allocated by task 194:
[   17.638641]  kasan_save_stack+0x3c/0x68
[   17.638682]  kasan_save_track+0x20/0x40
[   17.638718]  kasan_save_alloc_info+0x40/0x58
[   17.638778]  __kasan_kmalloc+0xd4/0xd8
[   17.638816]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.638862]  ksize_unpoisons_memory+0xc0/0x740
[   17.638910]  kunit_try_run_case+0x170/0x3f0
[   17.638954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.639003]  kthread+0x328/0x630
[   17.639060]  ret_from_fork+0x10/0x20
[   17.639097] 
[   17.639116] The buggy address belongs to the object at fff00000c7800700
[   17.639116]  which belongs to the cache kmalloc-128 of size 128
[   17.639177] The buggy address is located 5 bytes to the right of
[   17.639177]  allocated 115-byte region [fff00000c7800700, fff00000c7800773)
[   17.639245] 
[   17.639264] The buggy address belongs to the physical page:
[   17.639296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800
[   17.639728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.639844] page_type: f5(slab)
[   17.639887] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.639941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.640184] page dumped because: kasan: bad access detected
[   17.640259] 
[   17.640404] Memory state around the buggy address:
[   17.640441]  fff00000c7800600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.640721]  fff00000c7800680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.640906] >fff00000c7800700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.641017]                                                                 ^
[   17.641117]  fff00000c7800780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.641260]  fff00000c7800800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.641532] ==================================================================

[   11.883468] ==================================================================
[   11.884017] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   11.884478] Read of size 1 at addr ffff88810312f27f by task kunit_try_catch/211
[   11.884792] 
[   11.884886] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.884925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.884936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.884955] Call Trace:
[   11.884969]  <TASK>
[   11.884984]  dump_stack_lvl+0x73/0xb0
[   11.885010]  print_report+0xd1/0x650
[   11.885044]  ? __virt_addr_valid+0x1db/0x2d0
[   11.885065]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.885086]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.885107]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.885129]  kasan_report+0x141/0x180
[   11.885149]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.885175]  __asan_report_load1_noabort+0x18/0x20
[   11.885197]  ksize_unpoisons_memory+0x7b6/0x9b0
[   11.885220]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.885240]  ? finish_task_switch.isra.0+0x153/0x700
[   11.885260]  ? __switch_to+0x47/0xf50
[   11.885283]  ? __schedule+0x10cc/0x2b60
[   11.885303]  ? __pfx_read_tsc+0x10/0x10
[   11.885322]  ? ktime_get_ts64+0x86/0x230
[   11.885344]  kunit_try_run_case+0x1a5/0x480
[   11.885366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.885386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.885407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.885428]  ? __kthread_parkme+0x82/0x180
[   11.885447]  ? preempt_count_sub+0x50/0x80
[   11.885468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.885490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.885511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.885532]  kthread+0x337/0x6f0
[   11.885550]  ? trace_preempt_on+0x20/0xc0
[   11.885571]  ? __pfx_kthread+0x10/0x10
[   11.885590]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.885609]  ? calculate_sigpending+0x7b/0xa0
[   11.885631]  ? __pfx_kthread+0x10/0x10
[   11.885651]  ret_from_fork+0x116/0x1d0
[   11.885668]  ? __pfx_kthread+0x10/0x10
[   11.885686]  ret_from_fork_asm+0x1a/0x30
[   11.885715]  </TASK>
[   11.885725] 
[   11.895249] Allocated by task 211:
[   11.895465]  kasan_save_stack+0x45/0x70
[   11.895702]  kasan_save_track+0x18/0x40
[   11.895916]  kasan_save_alloc_info+0x3b/0x50
[   11.896377]  __kasan_kmalloc+0xb7/0xc0
[   11.896605]  __kmalloc_cache_noprof+0x189/0x420
[   11.896833]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.897101]  kunit_try_run_case+0x1a5/0x480
[   11.897337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.897688]  kthread+0x337/0x6f0
[   11.897853]  ret_from_fork+0x116/0x1d0
[   11.898000]  ret_from_fork_asm+0x1a/0x30
[   11.898147] 
[   11.898218] The buggy address belongs to the object at ffff88810312f200
[   11.898218]  which belongs to the cache kmalloc-128 of size 128
[   11.898935] The buggy address is located 12 bytes to the right of
[   11.898935]  allocated 115-byte region [ffff88810312f200, ffff88810312f273)
[   11.899628] 
[   11.899704] The buggy address belongs to the physical page:
[   11.900005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10312f
[   11.900662] flags: 0x200000000000000(node=0|zone=2)
[   11.900933] page_type: f5(slab)
[   11.901091] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.901563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.901946] page dumped because: kasan: bad access detected
[   11.902381] 
[   11.902486] Memory state around the buggy address:
[   11.902690]  ffff88810312f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.903062]  ffff88810312f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.903557] >ffff88810312f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.903869]                                                                 ^
[   11.904442]  ffff88810312f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.904683]  ffff88810312f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.904992] ==================================================================
[   11.857599] ==================================================================
[   11.857925] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   11.858394] Read of size 1 at addr ffff88810312f278 by task kunit_try_catch/211
[   11.858776] 
[   11.858924] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.858964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.858975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.858994] Call Trace:
[   11.859007]  <TASK>
[   11.859021]  dump_stack_lvl+0x73/0xb0
[   11.859189]  print_report+0xd1/0x650
[   11.859231]  ? __virt_addr_valid+0x1db/0x2d0
[   11.859264]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.859286]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.859307]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.859328]  kasan_report+0x141/0x180
[   11.859349]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.859375]  __asan_report_load1_noabort+0x18/0x20
[   11.859398]  ksize_unpoisons_memory+0x7e9/0x9b0
[   11.859420]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.859441]  ? finish_task_switch.isra.0+0x153/0x700
[   11.859488]  ? __switch_to+0x47/0xf50
[   11.859511]  ? __schedule+0x10cc/0x2b60
[   11.859532]  ? __pfx_read_tsc+0x10/0x10
[   11.859562]  ? ktime_get_ts64+0x86/0x230
[   11.859584]  kunit_try_run_case+0x1a5/0x480
[   11.859634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.859655]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.859676]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.859708]  ? __kthread_parkme+0x82/0x180
[   11.859727]  ? preempt_count_sub+0x50/0x80
[   11.859750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.859773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.859796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.859818]  kthread+0x337/0x6f0
[   11.859836]  ? trace_preempt_on+0x20/0xc0
[   11.859858]  ? __pfx_kthread+0x10/0x10
[   11.859878]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.859898]  ? calculate_sigpending+0x7b/0xa0
[   11.859920]  ? __pfx_kthread+0x10/0x10
[   11.859940]  ret_from_fork+0x116/0x1d0
[   11.859957]  ? __pfx_kthread+0x10/0x10
[   11.859977]  ret_from_fork_asm+0x1a/0x30
[   11.860006]  </TASK>
[   11.860017] 
[   11.870567] Allocated by task 211:
[   11.870760]  kasan_save_stack+0x45/0x70
[   11.871011]  kasan_save_track+0x18/0x40
[   11.871222]  kasan_save_alloc_info+0x3b/0x50
[   11.871672]  __kasan_kmalloc+0xb7/0xc0
[   11.871905]  __kmalloc_cache_noprof+0x189/0x420
[   11.872200]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.872363]  kunit_try_run_case+0x1a5/0x480
[   11.872650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.872955]  kthread+0x337/0x6f0
[   11.873088]  ret_from_fork+0x116/0x1d0
[   11.873309]  ret_from_fork_asm+0x1a/0x30
[   11.873696] 
[   11.873773] The buggy address belongs to the object at ffff88810312f200
[   11.873773]  which belongs to the cache kmalloc-128 of size 128
[   11.874681] The buggy address is located 5 bytes to the right of
[   11.874681]  allocated 115-byte region [ffff88810312f200, ffff88810312f273)
[   11.875784] 
[   11.876220] The buggy address belongs to the physical page:
[   11.876465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10312f
[   11.876857] flags: 0x200000000000000(node=0|zone=2)
[   11.877518] page_type: f5(slab)
[   11.877676] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.878009] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.878601] page dumped because: kasan: bad access detected
[   11.878944] 
[   11.879203] Memory state around the buggy address:
[   11.879723]  ffff88810312f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.880002]  ffff88810312f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.880519] >ffff88810312f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.881042]                                                                 ^
[   11.881509]  ffff88810312f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.881952]  ffff88810312f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.882519] ==================================================================
[   11.837567] ==================================================================
[   11.838060] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   11.838381] Read of size 1 at addr ffff88810312f273 by task kunit_try_catch/211
[   11.838762] 
[   11.838911] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.838969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.838980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.839001] Call Trace:
[   11.839013]  <TASK>
[   11.839045]  dump_stack_lvl+0x73/0xb0
[   11.839074]  print_report+0xd1/0x650
[   11.839096]  ? __virt_addr_valid+0x1db/0x2d0
[   11.839126]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.839173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.839194]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.839215]  kasan_report+0x141/0x180
[   11.839236]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.839263]  __asan_report_load1_noabort+0x18/0x20
[   11.839285]  ksize_unpoisons_memory+0x81c/0x9b0
[   11.839308]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.839329]  ? finish_task_switch.isra.0+0x153/0x700
[   11.839351]  ? __switch_to+0x47/0xf50
[   11.839376]  ? __schedule+0x10cc/0x2b60
[   11.839397]  ? __pfx_read_tsc+0x10/0x10
[   11.839417]  ? ktime_get_ts64+0x86/0x230
[   11.839440]  kunit_try_run_case+0x1a5/0x480
[   11.839476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.839499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.839525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.839557]  ? __kthread_parkme+0x82/0x180
[   11.839577]  ? preempt_count_sub+0x50/0x80
[   11.839684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.839713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.839748]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.839772]  kthread+0x337/0x6f0
[   11.839791]  ? trace_preempt_on+0x20/0xc0
[   11.839814]  ? __pfx_kthread+0x10/0x10
[   11.839833]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.839853]  ? calculate_sigpending+0x7b/0xa0
[   11.839877]  ? __pfx_kthread+0x10/0x10
[   11.839897]  ret_from_fork+0x116/0x1d0
[   11.839914]  ? __pfx_kthread+0x10/0x10
[   11.839933]  ret_from_fork_asm+0x1a/0x30
[   11.839962]  </TASK>
[   11.839973] 
[   11.848344] Allocated by task 211:
[   11.848551]  kasan_save_stack+0x45/0x70
[   11.848757]  kasan_save_track+0x18/0x40
[   11.848914]  kasan_save_alloc_info+0x3b/0x50
[   11.849197]  __kasan_kmalloc+0xb7/0xc0
[   11.849431]  __kmalloc_cache_noprof+0x189/0x420
[   11.849664]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.849816]  kunit_try_run_case+0x1a5/0x480
[   11.849976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.850408]  kthread+0x337/0x6f0
[   11.850586]  ret_from_fork+0x116/0x1d0
[   11.850772]  ret_from_fork_asm+0x1a/0x30
[   11.850923] 
[   11.850995] The buggy address belongs to the object at ffff88810312f200
[   11.850995]  which belongs to the cache kmalloc-128 of size 128
[   11.851714] The buggy address is located 0 bytes to the right of
[   11.851714]  allocated 115-byte region [ffff88810312f200, ffff88810312f273)
[   11.852523] 
[   11.852661] The buggy address belongs to the physical page:
[   11.852895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10312f
[   11.853282] flags: 0x200000000000000(node=0|zone=2)
[   11.853519] page_type: f5(slab)
[   11.853686] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.853954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.854272] page dumped because: kasan: bad access detected
[   11.854512] 
[   11.854606] Memory state around the buggy address:
[   11.854806]  ffff88810312f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.855265]  ffff88810312f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.855477] >ffff88810312f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.855745]                                                              ^
[   11.856323]  ffff88810312f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.856693]  ffff88810312f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.856961] ==================================================================